* pkgs: refactor needless quoting of homepage meta attribute
A lot of packages are needlessly quoting the homepage meta attribute
(about 1400, 22%), this commit refactors all of those instances.
* pkgs: Fixing some links that were wrongfully unquoted in the previous
commit
* Fixed some instances
erlang_basho_R16B03: added package file
erlang_basho_R16B03: added to top-level/all-packages.nix file
erlang_basho_R16B03_odbc: added to top-level/all-packages.nix file
erlang_basho_R16B03: Added the Carbon and Cocoa fields
erlang_basho_R16B03: Removed faulty maintainer
erlang_basho_R16B03: Added license as APL20
erlang_basho_R16B03: Made long and short description more informative
erlang_basho: added myself as a maintainer
erlang_basho: made configureFlags into an array
erlang_basho: added gcc as a dependency
erlang_basho: added escript replacement
erlang_basho: removed debugging cat statement
erlang_basho: changed subsitituteInPlace command to sed command
erlang_basho: added package
erlang_basho: Init at <R16B03
Minor OTP releases (and their manpages) are not available for dowload at
http://erlang.org/download
But e.g.:
- 18.3.1 contains an important fix for mnesia
- 18.3.1-18.3.4 has a lot of SSL/TLS fixes
So we have to fetch from GitHub and build everything ourselves.
Also replace explicit path patching with upstream patches:
- https://github.com/erlang/otp/pull/1023
- https://github.com/erlang/otp/pull/1103 - with this patch it's now
possible to build erlang in sandboxed mode
This allows you to turn on debug infor for all the beam packages in the
system with a single change at the top level. This is required for
debugging and dialyzer work. It also allows you to switch it on on a
package by package basis.
The following parameters are now available:
* hardeningDisable
To disable specific hardening flags
* hardeningEnable
To enable specific hardening flags
Only the cc-wrapper supports this right now, but these may be reused by
other wrappers, builders or setup hooks.
cc-wrapper supports the following flags:
* fortify
* stackprotector
* pie (disabled by default)
* pic
* strictoverflow
* format
* relro
* bindnow